General

  • Target

    94270_Video_Oynatıcı.apk

  • Size

    3.8MB

  • Sample

    210930-he8bwagggj

  • MD5

    9f61cbbc07215bdd03fdaf853844b911

  • SHA1

    92150d3e1b04bff5e1d2872c52822d0b361edb84

  • SHA256

    cfd3f39dacfe9d64b5925eb639d1a87246df01f85c9609caff48de170092f5e0

  • SHA512

    64d70bc091c9136fd0d7bc5ee9dcd031d2dbb4cdbf5475ae7ab5eb5cde4878ecd5e51edf1e70e7f6a7fbacd5a488880fd07e167f91b7e6a560cc4fcb507d37fa

Malware Config

Extracted

Family

hydra

C2

http://lolamaefarmer5823.online

Targets

    • Target

      94270_Video_Oynatıcı.apk

    • Size

      3.8MB

    • MD5

      9f61cbbc07215bdd03fdaf853844b911

    • SHA1

      92150d3e1b04bff5e1d2872c52822d0b361edb84

    • SHA256

      cfd3f39dacfe9d64b5925eb639d1a87246df01f85c9609caff48de170092f5e0

    • SHA512

      64d70bc091c9136fd0d7bc5ee9dcd031d2dbb4cdbf5475ae7ab5eb5cde4878ecd5e51edf1e70e7f6a7fbacd5a488880fd07e167f91b7e6a560cc4fcb507d37fa

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

MITRE ATT&CK Matrix

Tasks